Asymmetric encryption, also known as public-key cryptography, is a type of encryption that uses a pair of keys to encrypt and decrypt data.
The pair of keys includes a public key, which can be shared with anyone, and a private key, which is kept secret by the Owner.
The sender uses the recipient’s public key to encrypt the data. The recipient then uses their private key to decrypt the data.
Digital Signature:A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document.
Digital signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital messages.
2. Asymmetric Cryptography
• Asymmetric encryption, also known as public-key
cryptography, is a type of encryption that uses a pair of
keys to encrypt and decrypt data.
• The pair of keys includes a public key, which can be shared
with anyone, and a private key, which is kept secret by the
Owner.
• The sender uses the recipient’s public key to encrypt the
data. The recipient then uses their private key to decrypt
the data.
Add a footer 2
3. • Alice composes and encrypts an email for Bob using Bob’s public key. She
follows up by sending Bob the encrypted email. After receiving the email, Bob
uses his private key to decrypt it so that it may be read.
• As a result, Alice can communicate Bob securely without being concerned that
the message’s content will be viewed by someone else.
Example of Asymmetric Encryption
Add a footer 3
4. • Dual Keys
• Encryption and Decryption
• Digital Signatures
• Secure Key Exchange
• Security
Main Features of Asymmetric
Encryption
Add a footer 4
5. Dual Key:
Asymmetric encryption uses a pair of keys, including a public key and a private key.
The public key can be freely shared with anyone, while the private key is kept secret
and known only to the key owner.
Encryption and decryption:
Asymmetric encryption uses the public key to encrypt data and the private key to
decrypt data. This allows secure communication between two parties without the
need to exchange secret keys.
Digital signatures:
Asymmetric encryption enables the creation of digital signatures, which can be used
to verify the authenticity of data. A digital signature is created by encrypting a hash of
the data with the sender’s private key.
6. Secure key exchange
Asymmetric encryption allows for secure key exchange, which is a critical feature in
secure communication. For example, the Diffie-Hellman key exchange algorithm uses
asymmetric encryption to establish a shared secret key between two parties without
exchanging the key itself.
Security:
Asymmetric encryption is considered more secure than symmetric encryption because it
eliminates the need to exchange secret keys, which can be a security risk.
Additionally, the private key is kept secret, which makes it harder for attackers to
intercept or tamper with the data.
8. • A digital signature is a mathematical technique used to validate the authenticity
and integrity of a message, software, or digital document.
• Digital signatures can provide evidence of origin, identity and status of electronic
documents, transactions or digital messages.
Digital Signature
Add a footer 8
9. • Digital signatures are based on public key cryptography, also known as asymmetric
cryptography. Using a public key algorithm -- such as RSA -- two keys are generated,
creating a mathematically linked pair of keys: one private and one public.
• As a result, Alice can communicate Bob securely without being concerned that the
message’s content will be viewed by someone else.
How do digital signatures work?
Add a footer 9
10. • Digital signatures work through public key cryptography's two mutually
authenticating cryptographic keys. For encryption and decryption, the person who
creates the digital signature uses a private key to encrypt signature-related data.
The only way to decrypt that data is with the signer's public key.
• If the recipient can't open the document with the signer's public key, that
indicates there's a problem with the document or the signature. This is how digital
signatures are authenticated.
How do digital signatures work?
Add a footer 10
11. Financial Documents:
Finance departments digitally sign invoices so customers can trust that the payment
request is from the right seller, not from a bad actor trying to trick the buyer into
sending payments to a fraudulent account.
Health Data:
In the healthcare industry, privacy is paramount for both patient records and research
data. Digital signatures ensure that this confidential information was not modified
when it was transmitted between the consenting parties.
Benefits of Digital Signatures
Add a footer 11
12. Legal documents and contracts:
Digital signatures are legally binding. This makes them ideal for any legal document
that requires a signature authenticated by one or more parties and guarantees that
the record has not been altered.
Sales contracts:
Digital signing of contracts and sales contracts authenticates the identity of the seller
and the buyer, and both parties can be sure that the signatures are legally binding and
that the terms of the agreement have not been changed.
Benefits of Digital Signatures
Add a footer 12